From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
For a recent study I compared Redlaser and ShopSavvy smartphone barcode readers for on shelf use. I notice today that Microsoft has added a 2D barcode reader...Franz Dill From The Eponymous Pickle | March 9, 2011 at 09:28 PM
From The Computing Community Consortium Blog
The New York Times picks up on a point made in the recent report of the PresidentEd Lazowska From The Computing Community Consortium Blog | March 9, 2011 at 06:20 PM
In Brandweek: Unilever says that brands must be turned into media properties via content.Franz Dill From The Eponymous Pickle | March 9, 2011 at 05:39 PM
Lots of interesting stories touching on computing research in The New York Times and Time magazine in the past couple weeks: - Feb. 28 –Erwin Gianchandani From The Computing Community Consortium Blog | March 9, 2011 at 05:16 PM
Commentary regarding the Febreze benchmark on the Brand Channel. A Billion dollars in sales for a quite simple concept.Franz Dill From The Eponymous Pickle | March 9, 2011 at 05:07 PM
Top 10 Reasons Why You Should Attend (or Should Have Attended) SIGCSE
10. It has a long tradition (42 years to be exact!) of bringing together people from all... From Computer Science Teachers Association | March 9, 2011 at 05:06 PM
A thoughtful interview post on issues that occur with mobile location data. " ... Between identifying relevant and accurate data sources, harmonizing data from...Franz Dill From The Eponymous Pickle | March 9, 2011 at 03:26 PM
In a definite case of when not if, Leslie Valiant will receive the 2010 ACM Turing Award, the highest honor in all of computer science. Valiant has done incredible...Lance From Computational Complexity | March 9, 2011 at 03:19 PM
Last week Experientia participated in Ecobuild 2011 (London, UK) to showcase its work in user-centred sustainable design for the built environment, and in particular...Experientia From Putting People First | March 9, 2011 at 01:19 PM
'No sysadmin' is the key to Freedom Box "The Freedom Box project will succeed or fail on whether it works "without sysadmin". If only trained sysadmins can figure...Simon Phipps From Wild WebMink | March 9, 2011 at 01:02 PM
A programmer installed malware into the Whack-a-Mole arcade game as a form of job security.
It didn't work.
schneier From Schneier on Security | March 9, 2011 at 12:38 PM
As many of you know there is a new AP CS course, APCS Principles, under development. A second round of pilot courses is planned for next school year and the program...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 9, 2011 at 10:24 AM
An interesting viewpoint article in ACM. In one way this is quite obvious, computer science has gone far beyond mathematics ... far beyond just 'computing'Computer...Franz Dill From The Eponymous Pickle | March 9, 2011 at 05:45 AM
A very good direction we are seeing as key Business Intelligence vendors are supporting mobile. You should be able to take your intelligence to wherever your data...Franz Dill From The Eponymous Pickle | March 8, 2011 at 11:51 PM
A programming language is Turing complete if it equivalent to a Turing machine. In practice, it means that any algorithm can be implemented. Most programming languages...Daniel Lemire From Daniel Lemire's Blog | March 8, 2011 at 11:50 PM
In Adage: a good overview of what marketers should think about when considering the use of location based services.Franz Dill From The Eponymous Pickle | March 8, 2011 at 08:05 PM
3D Printers creating food. It appears there is still much to do here before this becomes practical or very appetizing. Yet the direction is clear, digitally...Franz Dill From The Eponymous Pickle | March 8, 2011 at 02:55 PM
Keith Marzullo, a Division Director within the NSF’s CISE Directorate, recently sat down to describe his experiences working at the National Science Foundation....Erwin Gianchandani From The Computing Community Consortium Blog | March 8, 2011 at 01:05 PM
It's a clever hack, but an old problem: the authentication in these sorts of normal operations isn't good enough to prevent abuse.
schneier From Schneier on Security | March 8, 2011 at 12:35 PM